The realisation that one serious security incident or data breach could derail the growth and profitability of your company because of the cost to remediate, fines, legal fees and customer loss. As a result of this awareness, the role of the CISO is growing in importance, as is the need to have an enterprise-wide IT...

Since money is everywhere, every business is a potential target for fraud.
Being knowledgeable about fraud and the tactics employed to facilitate it is a good first step on the road to effective detection and mitigation.
Your ability to identify and thwart fraud will be perpetually tested by a wide range of...

Misuse of privileged access and credentials is at the heart of 80 percent of security breaches according to Forrester. The challenge is that traditional responses to managing privileged and identity access often leave companies exposed because their focus is too narrow.
Download this eBook to learn how your...

Phishing has proved so successful that it is now the number one attack vector. The Anti-Phishing Working Group reports that in the first half of 2017 alone, more than 291,000 unique phishing websites were detected, over 592,000 unique phishing email campaigns were reported, and more than 108,000 domain names were used...

As DDoS attacks grow larger, more complex, and more pervasive, it can feel like we face a future of inevitable service outages and anxiety.
Less than ten years ago, a different problem was on everyone's mind; spam. Nearly 80 percent of the 200 billion+ emails sent each day in 2009 were solicitations from Nigerian...

Who are these cybercriminals? How do they target their victims? What are they after? By looking at actual law enforcement intelligence and case investigations from the past five years, we can learn specific tactics and techniques used by cybercriminals to manipulate machines and humans alike.
In this report we look...

A Canadian museum had multiple points of possible infiltration to protect: employees with memory sticks, phishing attacks, visitors and contractors connecting to Wi-Fi, and exhibit computers. Additionally, the museum had prevented ransomware attacks in the past, but needed to increase its level of protection.
The...

An investment firm needed a managed endpoint detection and response solution that could integrate into its existing security program, which already included two managed providers.
Download this case study to learn how the firm was able to:
Seamlessly integrate their new solution alongside other managed...

A global financial institution with over 3,000 endpoints across 30 countries had a network that was large, distributed, and vulnerable to attacks. A multi-state bank had already invested in application white-listing, but gaps remained and endpoints were vulnerable.
So how were both institutions able to solve their...

Chances are every channel accessed in your company by employees and customers has a different authentication process. Understanding why companies need to unify the multi-factor authentication (MFA) experience to improve security assurance and user experience is an essential aspect of empowering users to be more in...

The reality of just being able to know what's in the environment is to know where organisations are vulnerable so they can then take the right approaches to addressing it.
A frustrating factor with WannaCry is that it leveraged a known vulnerability, one that had been disclosed for over a month. The patch had...

More than half of surveyed organizations were struck by ransomware in 2017. And more than 75 percent of them were running up-to-date endpoint protection. What's the disconnect?
Download this whitepaper that discusses:
Highlights of the recent survey
Myths and realities about ransomware
How to improve endpoint...

Organizations are realizing they need to do more to protect access to their privileged accounts and systems. However, they are missing the mark when assembling a privileged access management strategy. Either their focus is too narrow, or they are looking at the "bells and whistles" of new technology, such as...

In 2014, the Department of Defense (DoD) issued instructions that replaced DoD Information Assurance Certification and Accreditation Process (DIACAP) with the Risk Management Framework (RMF). The RMF is designed to be managed as a continual process as the risk posture evolves over time for each information...